OTTx: One-Time Use Transactions for Blockchain Services
Abstract
In business computer networks, secure information exchange among organizations with diverse objectives is common. Users, identified uniquely, access resources through reliable applications. Integrating applications from external organizations introduces untrusted elements and requires necessitating mechanisms to ensure privacy, integrity, and non-repudiation. This work proposes a One-Time Transactions (OTTx) protocol in Blockchains. It addresses the need for secure transaction authentication, reviews the state of the art, and evaluates OTTx in a permissioned Blockchain. Results show that OTTx ensures security, privacy, integrity, and non-repudiation for transactions involving external identities, with satisfactory performance and low network overhead. This contribution advances Blockchain knowledge by providing an effective solution for transactions through untrusted network participants.References
Satoshi Nakamoto, ”Bitcoin: A Peer-to-Peer Electronic Cash System,”March 2009. Available at: [link].
A.-D Liu, X.-H Du, N. Wang, S.-Z Li, ”Research Progress of Blockchain Technology and Its Application in Information Security,”Journal of Software, vol. 29, pp. 2092-2115, July 2018. DOI: 10.13328/j.cnki.jos.005589.
Shrivas, M. K., Yeboah, T. (2019). ”The disruptive blockchain: types, platforms, and applications.”Texila International Journal of Academic Research, 3, 17-39.
Leslie Lamport, ”Password Authentication with Insecure Communication,”Communications of the ACM, vol. 24, no. 11, pp. 770–772, November 1981. DOI: 10.1145/358790.358797.
Woo-Suk Park, Dong-Yeop Hwang, Ki-Hyung Kim, ”A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain,”in Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), 2018. DOI: 10.1109/ICUFN.2018.8436784.
Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang, ”An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology,”in Proceedings of the 2018 IEEE International Conference on Communications (ICC), 2018. DOI: 10.1109/ICC.2018.8422733.
Mingli Zhang, Liming Wang, Jing Yang, ”A Blockchain-Based Authentication Method with One-Time Password,”in Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), 2019. DOI: 10.1109/IPCCC47392.2019.8958754.
Alessio Catalfamo, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari, ”A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication,”in Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), 2021. DOI: 10.1109/ISCC53001.2021.9631479.
Christian Cachin et al., ”Architecture of the Hyperledger Blockchain Fabric,”in Proceedings of the Workshop on distributed cryptocurrencies and consensus ledgers, Chicago, IL, 2016.
Elli Androulaki et al., ”Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,”Proceedings of the Thirteenth EuroSys Conference, EuroSys ’18, Porto, Portugal, 2018. DOI: 10.1145/3190508.3190538.
Gustavus J. Simmons, ”Symmetric and asymmetric encryption,”ACM Computing Surveys (CSUR), vol. 11, no. 4, pp. 305-330, 1979.
Chang-Seop Park, ”One-time password based on hash chain without shared secret and re-registration,”Computers and Security, 2018. DOI: 10.1016/j.cose.2018.02.010.
Quynh H. Dang, ”Secure hash standard,”Quynh H. Dang, 2015.
Devrim Unal, Abdulla Al-Ali, Ferhat Ozgur Catak, Mohammad Hammoudeh, ”A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption,”Future Generation Computer Systems, 2021. DOI: 10.1016/j.future.2021.06.050.
Rolf Oppliger, ”SSL and TLS: Theory and Practice,”Artech House, 2016.
A.-D Liu, X.-H Du, N. Wang, S.-Z Li, ”Research Progress of Blockchain Technology and Its Application in Information Security,”Journal of Software, vol. 29, pp. 2092-2115, July 2018. DOI: 10.13328/j.cnki.jos.005589.
Shrivas, M. K., Yeboah, T. (2019). ”The disruptive blockchain: types, platforms, and applications.”Texila International Journal of Academic Research, 3, 17-39.
Leslie Lamport, ”Password Authentication with Insecure Communication,”Communications of the ACM, vol. 24, no. 11, pp. 770–772, November 1981. DOI: 10.1145/358790.358797.
Woo-Suk Park, Dong-Yeop Hwang, Ki-Hyung Kim, ”A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain,”in Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), 2018. DOI: 10.1109/ICUFN.2018.8436784.
Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang, ”An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology,”in Proceedings of the 2018 IEEE International Conference on Communications (ICC), 2018. DOI: 10.1109/ICC.2018.8422733.
Mingli Zhang, Liming Wang, Jing Yang, ”A Blockchain-Based Authentication Method with One-Time Password,”in Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), 2019. DOI: 10.1109/IPCCC47392.2019.8958754.
Alessio Catalfamo, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari, ”A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication,”in Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), 2021. DOI: 10.1109/ISCC53001.2021.9631479.
Christian Cachin et al., ”Architecture of the Hyperledger Blockchain Fabric,”in Proceedings of the Workshop on distributed cryptocurrencies and consensus ledgers, Chicago, IL, 2016.
Elli Androulaki et al., ”Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,”Proceedings of the Thirteenth EuroSys Conference, EuroSys ’18, Porto, Portugal, 2018. DOI: 10.1145/3190508.3190538.
Gustavus J. Simmons, ”Symmetric and asymmetric encryption,”ACM Computing Surveys (CSUR), vol. 11, no. 4, pp. 305-330, 1979.
Chang-Seop Park, ”One-time password based on hash chain without shared secret and re-registration,”Computers and Security, 2018. DOI: 10.1016/j.cose.2018.02.010.
Quynh H. Dang, ”Secure hash standard,”Quynh H. Dang, 2015.
Devrim Unal, Abdulla Al-Ali, Ferhat Ozgur Catak, Mohammad Hammoudeh, ”A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption,”Future Generation Computer Systems, 2021. DOI: 10.1016/j.future.2021.06.050.
Rolf Oppliger, ”SSL and TLS: Theory and Practice,”Artech House, 2016.
Published
2024-05-20
How to Cite
DEFRÉMONT, André; PINHEIRO, Billy Anderson; VELOSO, Alan; ARAUJO, Roberto Samarone; ABELEM, Antônio Jorge.
OTTx: One-Time Use Transactions for Blockchain Services. In: BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 42. , 2024, Niterói/RJ.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2024
.
p. 1134-1147.
ISSN 2177-9384.
DOI: https://doi.org/10.5753/sbrc.2024.1552.
